Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems

Select Other "city & date"
Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems Course
Introduction:
The training course on Cybersecurity Monitoring, Event Management, and Incident Response in Intelligent Transportation Systems focuses on the essential activities required to establish a robust defense system against cyberattacks targeting ITS. The recent "supply chain attack" on cybersecurity companies, such as SolarWinds, in December 2020 has fundamentally changed the landscape of cyberspace, including ITS. This breach exposed the vulnerability of even meticulously designed systems, emphasizing the need for heightened security measures.
The SolarWinds cybersecurity breach stands out as a major incident that has already displayed the immense scale, significance, and damage it can cause. As more details of the breach continue to emerge, its impact is expected to grow further. While the SolarWinds breach primarily compromised data confidentiality, it is only a matter of time before other security aspects, such as application-related data integrity, are compromised in similar attacks. If the data integrity pertaining to critical real-world functions like the ITS infrastructure is compromised, the consequences for the industry can be catastrophic.
Cybersecurity necessitates not only strong defense mechanisms but also resilience. Attendees of this training course will gain a comprehensive understanding of the essential steps required to meet these overarching requirements in an ITS environment. By delving deep into the subject matter, participants will acquire the knowledge and skills necessary to effectively monitor, manage events, and respond to cybersecurity incidents in the context of Intelligent Transportation Systems.
Course Objectives:
By the end of this training course, participants will learn to:
- Understand the ITS environment and explain its architecture
- List and explain various ITS Cybersecurity Threats and Vulnerabilities
- Perform an ITS Cybersecurity Risk Assessment and develop mitigation strategies
- Develop an ITS monitoring and incident response plan
- List and analyze the most important current and future practices of strong defenses
- List and understand the most significant ITS and Cybersecurity Standards
Who Should Attend?
This training course is designed for all the people involved in operations, software, services, mobility ITS infrastructure, traffic and transport planning and organization, IT experts, as well as researchers and consultants involved in cybersecurity, management, big data, communications, project management, and intelligent transport mobility.
This training course is suitable for a wide range of professionals but will greatly benefit:
- IT and Cybersecurity Professionals
- Operators and Professionals of Transport Systems
- City governments Involved in Transport Systems
- Enterprises involved in the design of Transport Systems
- Project Managers
- Technology Engineers, Chief Technology Officers (CTOs), and Chief Information Officers (CIOs)
- Strategic Development Personnel
- Transport Operators, Engineers, Managers, and Researchers
- ITS and Cybersecurity Industry Consultants
Course Outlines:
Cybersecurity & the Intelligent Transportation (ITS) System Environment
- How cyber-attacks happen
- Industries affected
- The Intelligent Transportation System (ITS) Environment
- Role of Autonomous vehicles
- ITS Architecture
- New mobility platforms
- A Need to Secure ITS
ITS models, Infrastructure, Cybersecurity Threats & Vulnerabilities
- Overview of Cybersecurity
- ITS Models: Operators
ITS systems and infrastructure - Communication systems, wired, wireless
- Data management, sharing, and governance
- Threats & vulnerabilities in ITS
ITS Cybersecurity Risk Assessment and Mitigation
- Cybersecurity Risk assessment in ITS
- Cybersecurity challenges
- Approaches in ITS cybersecurity
- Cybersecurity protection frameworks: NIST and others
- Cybersecurity Controls
ITS Monitoring and Incident Response
- Penetration Testing for ITS
- Cybersecurity Monitoring
- Event Management
- Incident Response
- Best practices for first responders
ITS & Cybersecurity Standards – Current and Future Practices
- ITS & Cybersecurity Standards
- Good Practices
- Gap Analysis
- Plan of action
- Innovative approaches: AI, blockchain